40:29 Integrating Mobile Devices into your Penetration Testing Program Georgia Weidman All Hacking Cons
49:50 To bounty, or not to bounty Security insights from 500 organizations Alex Rice All Hacking Cons
56:49 Attack tree vignettes for Containers as a Service applications Tony Uceda Vélez All Hacking Cons
46:38 AuthMatrix Simplified Authorization Testing for Web Applications Mick Ayzenberg All Hacking Cons